Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
October 23, 2018
Search
Highlight

How to teach computer ethics through science fiction
This is one of those very strange articles that makes one happy, just by its very existence. The article opens with a general statement that, most unfortunately, is not obvious to many (perhaps most) people: “Computer science faculty have a responsibility to teach students to recognize both the larger ethical issues and particular... more
Quote
A digital computing machine can accomplish in a day a body of work that would take the full efforts of a team of computers for a year, and it will accomplish this work... more
- Norbert Wiener (1964)
Articles
Application of augmented reality for multi-scale interactions in emergency vehicles: AutomotiveUI 18

The paper describes research in its early stages. It presents a concept for using augmented reality (AR) to assist emergency medical technicians (EMTs) rushing to respond to emergency calls. The authors... more

Miscellaneous (H.5.m) | Oct 23 18

A computational global tangential Krylov subspace method for model reduction of large-scale MIMO dynamical systems: Journal of Scientific Computing

The authors use a very sophisticated tool to solve a very old problem of model order reduction. They compare the performance of... more

Chaotic Systems (G.1.7...) | Oct 22 18

Systematically understanding the cyber attack business: a survey: ACM Computing Surveys

Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method... more

Security & Protection (K.6.5) | Oct 19 18

Mitigating risks of digitalization through managed industrial security services: AI & Society

This paper discusses the risks of industrial security services. Moreover, the authors consider future automation scenarios as well as the major concepts involved in industrial security... more

Security & Protection (K.6.5) | Oct 19 18

Sleep behavior assessment via smartwatch and stigmergic receptive fields: Personal and Ubiquitous Computing

A stigmergic receptive field (SRF) is suggested as an improved variant of machine learning (ML). The authors successfully prove their proposed variant. They... more

Sensor Networks (C.2.1...) | Oct 18 18

On k-abelian palindromes: Information and Computation

This paper explores words (finite strings over a fixed finite alphabet Σ with at least two letters) that are k-abelian equivalent to their reversals. Two words are k-abelian equivalent if and only if their multisets... more

Nonnumerical Algorithms & Problems (F.2.2) | Oct 17 18

OWL reasoning: subsumption test hardness and modularity: Journal of Automated Reasoning

This paper is aimed at web ontology language (OWL) authors and tool developers. These people know that SROIQ(D), the logic that underpins OWL, has a... more

Ontologies (I.2.4...) | Oct 16 18

Making machine learning robust against adversarial inputs: Communications of the ACM

Machine learning (ML) has become ubiquitous in recent times. It is used in numerous (important) applications and its use will seemingly only increase. The current ML state of... more

Machine Translation (I.2.7...) | Oct 15 18

How to teach computer ethics through science fiction: Communications of the ACM

This is one of those very strange articles that makes one happy, just by its very existence. The article opens with a general statement that, most unfortunately, is not obvious to many (perhaps most) people... more

Ethics (K.4.1...) | Oct 15 18

From hidden to visible: Theoretical Computer Science

Algebraic specification is a technique in which a system is modeled by equations or conditional equations. This approach was originally used for defining data types and operations on them. An added benefit is that the... more

General (F.0) | Oct 12 18

Books
The entrepreneurial project manager

Most of the time readers neglect the introduction, but here it is important because the book’s main concepts are very well explained in just a few pages, for example, the importance of philosophy on the project manager’s mindset. The book is divided into 12 chapters... more
Project & People Management (K.6.1) | Oct 22 18

Fundamentals of computer vision

The fundamental principles of computer vision based on image processing technologies are presented in this book. The style of the content is informal; meanwhile, a lot of equations are involved. The reader should have enough math background, including linear... more
Computer Vision (I.5.4...) | Oct 19 18

Introduction to modeling and simulation with MATLAB and Python

This is a very unusual book. It is concise and well written on the one hand, with bewildering content on the other. If one steps back far enough, the book could be described as a tutorial on writing programs... more
General (I.6.0) | Oct 18 18

Software engineering (10th ed.)

This book has been around for about three decades. This newest version is the tenth edition. Software engineering is--has become--an enormous subject. The book is very long--over 800 pages--and yet it... more
General (D.2.0) | Oct 17 18

Data science fundamentals for Python and MongoDB

Data science is an important and growing field in computing. This book purports to provide an introduction to data science with Python and MongoDB. It fails on pretty much every level. Here are... more
Object-Oriented Programming (D.1.5) | Oct 17 18

Big data factories

In the technology world, ABCD is a buzzword. “A” stands for artificial intelligence (AI), “B” for blockchain, “C” for cloud, and “D” for big data. “D” especially is the origin of the others: you need the cloud because you have to store big data; blockchains can be used to... more
Content Analysis & Indexing (H.3.1) | Oct 16 18

The diversity bonus

Diversity, perhaps appropriately, means different things to different people. To some it is a quasi-religious norm and a central motivation in political discussions and policy debates. To others, such as cognitive scientists and experts in machine learning, it refers to... more
Business (J.1...) | Oct 15 18

Microservices and containers

Microservices and containers is an interesting book, albeit a flawed one. It addresses two important topics, but only loosely justifies putting the two topics in the same work. It is divided into three sections... more
General (D.2.0) | Oct 12 18

A journey through discrete mathematics: a tribute to Jiří Matoušek

Professor Jiří Matoušek was a distinguished scientist with significant achievements in the areas of discrete and “computational geometry, topology, and some aspects of metric space theory.” His work in... more
General (G.2.0) | Oct 11 18

Reinforcement learning

The success of reinforcement learning (RL) in everything from AlphaGo to intelligent decision making for services in everyday life has made RL a hot topic. The concept has been around since the birth of artificial intelligence (AI) via Turing’s ideas, especially in Marvin... more
Python (D.3.2...) | Oct 11 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy